Bridging Threat Models and Detections: Formal Verification via CADP
By: Dumitru-Bogdan Prelipcean, Cătălin Dima
Potential Business Impact:
Checks if security rules catch real threats.
Threat detection systems rely on rule-based logic to identify adversarial behaviors, yet the conformance of these rules to high-level threat models is rarely verified formally. We present a formal verification framework that models both detection logic and attack trees as labeled transition systems (LTSs), enabling automated conformance checking via bisimulation and weak trace inclusion. Detection rules specified in the Generic Threat Detection Language (GTDL, a general-purpose detection language we formalize in this work) are assigned a compositional operational semantics, and threat models expressed as attack trees are interpreted as LTSs through a structural trace semantics. Both representations are translated to LNT, a modeling language supported by the CADP toolbox. This common semantic domain enables systematic and automated verification of detection coverage. We evaluate our approach on real-world malware scenarios such as LokiBot and Emotet and provide scalability analysis through parametric synthetic models. Results confirm that our methodology identifies semantic mismatches between threat models and detection rules, supports iterative refinement, and scales to realistic threat landscapes.
Similar Papers
Empirical assessment of the perception of graphical threat model acceptability
Cryptography and Security
Helps people understand computer security risks better.
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs
Cryptography and Security
Finds sneaky computer break-ins by watching how people use systems.
APT-CGLP: Advanced Persistent Threat Hunting via Contrastive Graph-Language Pre-Training
Cryptography and Security
Finds sneaky computer hackers using smart AI.